3rd & 5th October 2024

Great Malvern, UK

13th Edition

#InnovateMalvern

CyberLocks250pxw

Themed Symposium

Thursday 5th October 2017 (all day)

Malvern Theatres, Great Malvern, WR14 3HB

We do so much using computer technology that cybersecurity has become a household term. But artificial intelligence (AI) is around the corner, impacting not just our lives in cyberspace, but also our lives in the real world...

GU UKCSF 50pxhThe session showcased cutting-edge developments from some of the UK's fastest growing and most advanced cyber security SMEs alongside thought provoking insights from multinational experts in the field. The symposium was organised in collaboration with the UK Cyber Security Forum CIC.

 

The exhibition and symposium were free for all to attend.

 


 EuroCyberSecMonth


European Cyber Security Month

ECSM is the EU’s annual advocacy campaign that takes place in October and aims to raise awareness of cyber security threats, promote cyber security among citizens and provide up to date security information, through education and sharing of good practices.

@CyberSecMonth, #CyberSecMonth

 

Programme


09:30

Registration & Exhibition Opens

Tour the exhibition ahead of the symposium.

@festivalofinnov #InnovateMalvern #cybersecurity #AI

10:00

Welcome

Presentations begin in the auditorium

Dr Adrian Burden, Festival Founder & Managing Director of Innovate Malvern CIC @apburden

Dr Emma Philpott, Managing Director of UK Cyber Security Forum CIC @emphilpott


10:15

TPullen


Keynote Presentation

Artificial Intelligence (AI) has far more to offer defenders than attackers in today's world of Cyber Security. Traditional thinking about security has generally relied on physical distance, risk appetite, and technology profile to divide responsibilities for protection, enforcement, intelligence and military activities. But with modern global infrastructure physical distance is meaningless, stealing £1000 is roughly as hard as stealing £10M, and cyber weapons are cheap: defence is lagging far behind. AI can provide defenders the huge boost in depth, pace and impact that they desperately need.

Tim Pullen, Operational Cyber Technical Authority at BAE Systems Applied Intelligence

Tim has worked in secure development and low-level technical cyber research for 15 years. He is currently responsible for the recruitment, training and career development for a team of around 75 technical cyber experts and coaches the UK's team for the European Cyber Security Challenge. Tim is enthusiastic about Cyber Security competitions - the gamification of hacking - and other ways to identify and grow the cyber experts we desperately need. He can't decide if he'd rather be reverse-engineering bare-metal ARM assembly code, developing a training course, or running a hands-on recruitment event.

@BAESystems_AI


10:45

SpeakerPortrait


Real-time Cognition for Cyber Defence

The presentation will explore an all-source intelligence system for cyber defence to provide automated triage and the enrichment of machine learning used for detecting anomalies. This will include an overview of Fortitude's Cognition, an intelligence-led AI-enabled cyber defence system. 

David Atkinson, Director at Fortitude Cyber Security has over fifteen years of experience working within specialist military units and Government departments. David has developed a range of specialist capabilities for cyber operations and information security challenges at both the strategic and operational level including developing the future integration strategy for the employment of specialist cyber techniques. Working in partnership with civilian, military, corporate and government organisations David was responsible for designing and developing innovative technologies for use in some of the most challenging operational environments globally. 


11:00

ColinOHalloran


Cyber defence by swarm intelligence

This talk will discuss the application of swarm intelligence to detecting and responding to malware behaviour on a network. Results from a proof of concept will be reported. 

Prof. Colin O’Halloran, Technical Director at D-RisQ Ltd.

Colin has worked on the mathematical verification and validation of software based systems for over 30 years. He has worked on the foundations of secure software systems before turning to assuring the safety of software based systems. In 1996 he served on the European Space Agency’s board of inquiry into the explosion of Ariane 5 during its first flight. In the mid-nineties he proposed the approach and led the team responsible for the machine based proof of correctness for the avionics control systems for the Typhoon Eurofighter from 2000-2009. He is recognised as a leading practitioner in applying formal methods to industrial problems and is also currently a Professor at the department of Computer Science at Oxford University.


11:15

JAkhtar 150pxw

TSeidling 


Our startup journey & the GCHQ Accelerator

This talk will describe the journey of building a cyber security startup and reveal what went on in the first ever GCHQ cyber accelerator. 

Jamie Akhtar, Co-Founder & CEO CyberSmart

Jamie Akhtar is passionate about helping businesses improve their cyber security posture. His focus is on engaging directors, managers and developers in order to inform, educate and defend against cyber threats. Jamie believes security underpins technology and society as a whole - without proper controls in place there is a risk of losing the liberty and assurance everyone depends on. Jamie has a degree in Management Studies and a Masters in Entrepreneurship, both from the University of Nottingham. 

@JamieAkhtar, @cybersmartuk

 

Thomas Seidling, Relationship Manager at CyberSmart

As an ex-olympian, Thomas knows that the tough path is often the right one. After completing a masters in Law, Thomas did what any reasonable professional would do and joined a startup. Ensuring seamless communications with partners, advisors and clients at CyberSmart, Thomas strives towards the mission of securing the worlds small medium businesses.

@cybersmartuk


11:30

SLaidlaw


Using AI for advanced cyber threat detection

Synopsis to follow.

Stuart Laidlaw is co-founder and CEO of Cyberlytic, which he co-founded in 2013. He previously held senior management positions at several global security companies including BAE Systems, CGI and Fujitsu, where he was responsible for delivering large-scale IT security programmes. Prior to starting Cyberlytic, Stuart led groundbreaking software and IT projects for both the National Crime Agency and UK Foreign Office.

@CyberlyticUK


11:45

JUnsworth 150pxw 


Working with the London Digital Security Centre

The London Digital Security Centre is a joint venture between the Mayors Office for Police and Crime (MOPAC), the Metropolitan Police Service (MPS) and the City of London Police (CoLP). Working in partnership with academia and the private industry the London Digital Security Centre aims to help protect businesses operating in London from online criminal threats.

John Unsworth, Chief Executive of the London Digital Security Centre

John is a highly regarded financial and cyber crime intelligence professional. He has 20+ years experience in successfully leading national intelligence activities in the UK aimed at identifying, preventing and detecting criminal activities and targeting financial and cyber crime threats committed by Organised Crime Groups. Prior to joining the London Digital Security Centre, John was seconded to the Global Cyber Alliance (GCA), from one of its co founders the City of London Police (CoLP) and also led CoLPs Economic and Cyber Crime Prevention Centre (ECPC). John has recently completed a Masters degree in Criminology at Cambridge University.

@LondonDSC


12:00

Networking Lunch

Opportunity to tour the exhibition


13:30

JAbbott 150pxw 


Keynote: The future of identity management

 

John Abbott, Director of Business Growth and Partnerships at Yoti.

For over 15 years, John has worked closely with government and private sector senior leadership teams to tackle their most complex business and IT challenges. As a member of the senior management team at Yoti, John is responsible for driving engagement in Yoti’s solutions and forming partnerships with businesses, governments and charities. John started his career in brand management in the early growth phase of Red Bull, and has had a varied business career at leading global consultancies including Accenture and PwC.

@getyoti


14:00

TAlcott 150pxw


Certification on the Blockchain

With the increased need to audit and secure supply chains, as well as the staff within them, there is an opportunity to use self-sovereign identity management with Blockchain technology. This approach means that companies and individuals can provide appropriate information to stakeholders without compromising privacy. Such a system can also improve efficiencies whilst reducing costs.

Tom Alcott, CEO of BlockMark Technologies

Tom is a seasoned entrepreneur who has previously created five start ups including; The Social Network Company (social network analytics software analysing Bank social capital risk), the international water charity FRANK Water funding 300+ villages in India, and spice specialist Peppermongers, involving global supply chains. A Blockchain technology evangelist, Tom is passionate about creating trustless protocols to increase business success.

@blockmarktech


14:15

MCartwright 


Introducing Streembit™ Peer to Peer networks and securing IOT

This presentation will provide an overview of how a solution to cost effectively secure Internet of Things devices whilst addressing scalability and security challenges has been developed and tested.

Matthew Cartwright, Director of Business Development at Zovolt

Matt has gained extensive experience of introducing technology solutions to businesses in fast growth markets covering internet services, data centre and cloud technologies.  He has a natural focus on emerging trends in technology as well as a strong network of commercial clients in Europe and North America, that presents a fertile ground for debating current technologies and how they can be improved. His current role is part of the founding team behind Streembit™ creating secure P2P networks in IOT and CAV ‘Connected Autonomous Vehicle’ markets.  

@streembit 

 


14:30

SpeakerPortrait 


Keynote

An update from the UK's National Cyber Security Centre on Protecting our Digital Landscape

Andy is Chief Technology Officer, Economy & Society Engagement Sector, National Cyber Security Center.

@ncsc


15:00

PRogers 


Securing information in multi-user databases

GBR14’s Specific Identify Crypt © technology is a new, all-in-one database access and protection solution. SIC denies database attacks and stems repeated loss of millions of records. We achieve this through ingenious application of individual user encryption via the simplest possible secure access interface for users and administrators.

Peter Rogers, Chief Executive Officer at GBR14 Ltd

Peter previously worked at senior levels within BT and QinetiQ in general business as well as security, intelligence and cyber technology. Most recently Peter has applied his experience and energy to direct a series of hi-tech SMEs including companies such as Aurix, Digital Barriers and Sentinor, covering markets as diverse as Call Centre’s, Intelligence Surveillance, drinking Water Security and Heritage Protection. 


15:15

ARitchie 


How will connected technologies change the world that we live in?

By 2020 some models predict that there will be three times as many connected devices as there are human beings on the planet. This emerging connected world combined with advances in artificial intelligence and robotics will have a major impact on our society and will fundamentally change the macroeconomic trends which have prevailed for the last three decades. So, what does this world look like and what are the implications of this shift?

Dr Alisdair Ritchie – Impact Champion, University of Warwick and PETRAS

Alisdair is Impact Champion and a member of the leadership team for the PETRAS Cyber Security of the Internet of Things Research Hub. His focus is on delivering the programme’s long term strategy, socio-economic impact and securing its legacy. He has spent 15 years both leading and producing research across the academic and commercial knowledge fields. He has extensive business development, operational and analytical experience in the technology sector working with a wide variety of companies in the process from SMEs to household names and corporate giants.

@PETRASiot


15:30

 


Networking and opportunity to tour the exhibition

Complimentary tea & coffee networking session kindly supported by Innovate UK Knowledge Transfer Network.


16:30

Close

 

 

Exhibition


ActiveReachLogo 150pxw

Activereach provides a complete range of Internet, networking, voice & security solutions to businesses across the UK and Europe. Everything they do prioritises security, performance, and resilience. [Stand B20]

@activereach


APMG 150pxw

APMG accredits organizations to deliver training courses and consultancy services for a broad range of professional certification schemes. [Stand A06]

@APMG_Inter


ArmourComms 150pxw

Armour Communications Limited is a UK based organisation and provides government-grade encryption for secure communications (voice, messaging, video and data) on everyday smartphones and tablets across all popular platforms. [Stand B03]

@ArmourComms


BAELogo 150pxw

BAE Systems is a leading supplier of cyber, intelligence, and security capabilities to government agencies, and a growing supplier of cyber and network security capabilities to commercial customers. Growing rapidly, the company is looking for security cleared engineers, consultants and delivery professionals to join their team. [Stand B06]

@baesystems_ai


BobsBusiness Logo 150pxw

Bob’s Business is a cyber security awareness company on a mission to help you bridge the knowledge gap between IT and end users. They specialise in delivering security awareness and education in an innovative way that engages the user and results in a culture change within the workforce. [Stand B04]

@BobsBusinessUK


borwell 150pw


The borwell team create tailor-made solutions using a number of different technologies and coding languages to deliver the best possible solution for your business. Their highly skilled team will work with your experts to understand your requirements and use their extensive knowledge to your advantage to deliver you a world class solution. Their staff range from very creative to diligent analytical people. The main goal of the team is to automate your processes and workflows, normally moving your systems from paper and spreadsheets to a secure web app. [Stand B19]

@borwellteam


BPH 150pcw


BPH Training has experience in developing and delivering information assurance training and awareness to a wide range of commercial and public sector clients, including law enforcement and government. They believe it is essential that organisations develop a security culture as part of business as usual thus increasing their resilience to cyber security threats. [Stand A07]

@bph_training


 charlton 150pxw

Charlton Networks deliver a complete IT support service for their clients, designed to optimise the use of ICT within your business. Their clients benefit from a complete 'one-stop-shop', reducing the cost of your IT, increasing your productivity and removing the 'headache' of dealing with multiple suppliers and impersonal call centres. [Stand A08]

 

@cnetworksltd


COGNORE 150pxw

Cognore delivers Cyber Security technology and services equipped with advanced technique algorithms that conduct deep analysis of computer core functions to protect against cyber-attacks using a light weight OS level kernel based sensor experience. [Stand A09

@CognoreLtd 


CorsaireLogo 150pxw

Established in 1997, Corsaire are an Information Security organisation operating globally with a strong presence in the UK, UAE and Australia. They have a broad portfolio of services, supported by experienced and senior people with industry knowledge based on decades of client engagements, research and experience. [Stand A10]

@Corsaire


Cyberlytic 150pxw

Cyberlytic software uses machine learning to classify attack data, identify threat patterns and detect anomalies. [Stand A02]

CyberSmartLogo 150pxw

CyberSmart provides CE Smart, an automated compliance platform that helps you to identify, secure and certify against Cyber Essentials. They also provide ongoing protection via continuous security checks and complimentary cyber insurance coverage. [Stand A11]

@Cybersmartuk


CySureLogo 150pxw

CySure offers a Virtual Online Security Officer (VOSO) that is fully conversant with US Government’s NIST and UK Government’s Cyber Essentials (CE) standards. CySure’s VOSO is continually aware of your security status, providing plain-speaking reports against cyber-security best practice to ensure compliance throughout your organization. [Stand A12]


DRisQ 150pxw

D-RisQ has built an expert team of consultants, analysts and implementers to “change the way the world develops software” by bringing advanced automated software development tools to safety critical, security critical and business critical systems developers. [Stand B01]


ForeseetiLogo 150pxw

foreseeti is the developer and vendor of securiCAD, a novel tool for modelling the cyber security of IT systems. Their product helps organisations to measure, visualise and hence manage their cyber security in a proactive and cost-effective manner. [Stand A13]


FortitudeLogo 150pxw

Fortitude offer intelligence-led, AI-enabled cyber defence and resilience. [Stand A14]

GBR14Logo 100pxw

GBR14’s Specific Identify Crypt © technology is a new, all-in-one database access and protection solution. SIC denies database attacks and stems repeated loss of millions of records. They achieve this through an ingenious application of individual user encryption via the simplest possible secure access interface for users and administrators. Their mission is simple: Make data breaches a thing of the past – without heavy-handed user access procedures or costly reductions in data processing or transmission. [Stand A15]

IASME 150pxw

IASME is one of the four Cyber Essentials accreditation bodies appointed by the UK Government. Together with their Certification Body companies, they can certify you to the Cyber Essentials scheme required for many government tenders. They also offer the IASME Governance standard which, based on international best practice, is risk-based and includes aspects such as physical security, staff awareness, and data backup. [Stand B16]

@IASME1


infosecskills 150pxw


InfoSec Skills is a worldwide information security training and education company, comprising an expert team of highly respected security professionals from across the industry. Their faculty of subject matter experts is instrumental in authoring their highly acclaimed and accredited training courses that meet the needs of today’s information security professional. [Stand A03]

@infosec_skills


IntaForensicsLogo 150pxw

IntaForensics are one of the leading digital forensics and cyber security consultancies in the UK. Headquartered in Warwickshire, they operate from four UK based laboratories in Leeds, Warrington, Nuneaton and Stafford. They provide consultancy and assistance to organisations seeking Cyber Essentials and Cyber Essentials Plus certification. [Stand A16]

 

@intaforensics


IntegrityAssured 150pxw

In a world of ever-increasing corruption, fraud and deception, it’s vital to use a cost-effective and simple way to pre-screen employees, validate honesty amongst those in positions of trust, determine deception by those who break the law, and many other cases. Establishing and maintaining an organisational culture of trust and integrity starts with hiring honest people. [Stand A01]

@converusinc


InnovateUK KTNLogo 150pxw

The Knowledge Transfer Network (KTN) links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors. From agri-food to autonomous systems and from energy to design, KTN combines in-depth knowledge in all sectors with the ability to cross boundaries. We help innovators to find markets, find solutions and find funding. The Future. Faster. [Stand B14]

@KTNUK


LineOnLogo 100pxw

LineOn supports you in securing your entire system. Their speciality is the security of information and information systems, but they are also capable of finding the best products for your business and implementing them through their team of experts. [Stand A04]

LujamLogo 150pxw

LuJam offers a subscription based security service priced attractively for SMEs. It is complementary to firewalls and anti-virus software, detecting otherwise uncovered security threats including those associated with IoT devices. A sensor audits, reports and alerts on network activity, provides visibility of unauthorised devices, the use of cloud services and blocks access to high-risk areas of the Internet. [Stand B10]


MalvernCyber 150pxw

The Malvern Cyber Security Cluster is a group of small / medium cyber security companies centred around Malvern in Worcestershire, cooperating on a range of initiatives to grow their businesses. [Stand C01]

@MalvernCyber

NCSC 150pxw

The National Cyber Skills Centre (NCSC) delivers training in direct response to specific identified industry needs, supporting businesses both small and large. In terms of cyber security, the organisation offers a number of courses including training on Cyber Essentials and an introduction to cyber security called Cyber Bytes. [Stand B18]

@CyberSkillsUK


NimboxLogo 150pxw

Nimbox provide the most secure file collaboation and storage tools available to the enterprise. Integral to this remains their ability to custom-build their own software and equipment—hosted and administered in the UK—giving full control over their platform. [Stand B13]

@NimboxHQ


OmniscopeLogo 150pxw

Omniscope goes behind the scenes of deep web social media and darknet networking, tapping into open, closed and hidden online communities and identifying key players and actors in near real time and in context. Their context-aware operatives, analytics and surveillance capabilities shorten the time to intelligence, not just by reaching behind the scenes, but by buying the time and the tools to act in the context of any online threat. [Stand B12]


Origone 150pxw

Origone has internationally recognized expertise with products and services in Business Intelligence, Telecommunications, Cyber-Security, Cyber Intelligence and High Tech. The company provides governance software tools for businesses as well as solutlions to enhance and organisation's cyber security and cyber intelligence. Origone has a presence in various worldwide locations including London, Paris, Washington, Tel Aviv and New Delhi. [Stand B11]

@origoneltd


QinetiQLogo 150pxw

QinetiQ is a company of scientists and engineers essential to sovereign capability. The technical expertise and domain know-how of their people are their principal sources of competitive advantage and are well matched to the emerging themes in their markets. Their principal revenue streams are advice, services (particularly test and evaluation) and technology-based products. [Stand B08]


Sutcliffe 150pxw

 


Sutcliffe & Co provide honest, impartial insurance advice, a personal and professional service and quality insurance at competitive premiums. In addition to business liability, directors, and premises insurance, Sutcliffe & Co can provide Cyber Liability insurance. [Stand B16]

@sutcliffeCo


Titania 150pxw


Titania specialises in developing commercial software packages to enable organisations, auditors and consultants to undertake their own cyber security auditing and testing quickly and at low cost. [Stand B02]

@TitaniaLimited


Tranchulas 150pxw


Tranchulas are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services. The company’s elite team of security experts employs the latest threat intelligence and advanced countermeasures to help build effective security design that protects and enhances business operations. [Stand B07]

@tranchulas


usecure 150pxw

usecure's business is helping employees understand security and empowering them to become the strongest link in the chain. They understand the challenge presented with the increased frequency and sophistication of cyber-attacks. The challenge will only get greater, as businesses adopt new technologies and deliver increased mobility and flexibility, and that the user is at the centre of it all. [Stand B05]

@getusecure


UKCSF 150pxw

The UK Cyber Security Forum represents small medium enterprises who are actively working in cyber security across the UK, helping to set up informal local "Clusters" for the industry. With over 500 SME members, the forum provides a collaboration portal, industry news and business opportunities both in the UK and overseas. [Stand C01]

@UKcyberforum


UniWorcester 150pxw


University of WorcesterWorcester Business School offers students a learning experience rooted in a rich educational heritage and boosted by top quality facilities and a team of friendly, supportive staff. The university prides itself on offering relevant courses and has a truly innovative and effective ‘earn as you learn’ scheme, which provides its students with invaluable work experience, career development and earning opportunities. [Stand B17]

@theworcester_uni, @uw_business


WICLogo 150pxw

The Wyche Innovation Centre is a business accelerator and technology incubator situated in an Area of Outstanding Natural Beauty on the side of the Malvern Hills in the heart of the UK's Cyber Valley. It is home to over 40 businesses & organisations, including companies involved in the cyber security sector, operating from serviced offices, hot desks or as a virtual office. [Stand C01]

@WycheInnovation


YotiLogo 150pxw

Founded in 2014, Yoti is a London-based technology company on a mission to become the world’s trusted identity platform. The way that people prove their identity is outdated for the digital world. Their apps and technology will ensure people know who they’re dealing with and feel confident in being themselves without the risk of fraud. This will in turn improve transparency and trust in the information shared - and should make life simpler and better for everyone. [Stand B09]

@getyoti